International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 142 | Views: 327

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 9, September 2013 | Popularity: 6.8 / 10


     

Approach of Data Security in Local Network Using Distributed Firewalls

J. Lavanya, R. V. Krishnaiah


Abstract: Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulation is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass or during the sensitive data transmission. Distributed firewalls allow enforcement of security policies on a network without restricting its topology on an inside or outside point of view. Use of a policy language and centralized delegating its semantics to all members of the networks domain support application of firewall technology for organizations, which network devices communicate over insecure channels and still allow a logical separation of hosts in- and outside the trusted domain. We introduce the general concepts of such distributed firewalls, its requirements and implications and introduce its suitability to common threats on the Internet, as well as give a short discussion on contemporary implementations.


Keywords: Network Security, Security Policy, Pull technique, Push technique, Policy distribution


Edition: Volume 2 Issue 9, September 2013


Pages: 238 - 241



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
J. Lavanya, R. V. Krishnaiah, "Approach of Data Security in Local Network Using Distributed Firewalls", International Journal of Science and Research (IJSR), Volume 2 Issue 9, September 2013, pp. 238-241, https://www.ijsr.net/getabstract.php?paperid=07091302, DOI: https://www.doi.org/10.21275/07091302



Similar Articles

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra, Chandra Sekhar Dash

Share this Article

Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024

Pages: 1927 - 1929

Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix

Tahir Bashir

Share this Article

Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024

Pages: 882 - 886

Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation

Manupreet Kaur

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article
Top